Security vulnerabilities of SGX and countermeasures: A survey
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …
applications. The popularity of TEEs derives from its high security and trustworthiness …
Adversarial interference and its mitigations in privacy-preserving collaborative machine learning
Despite the rapid increase of data available to train machine-learning algorithms in many
domains, several applications suffer from a paucity of representative and diverse data. The …
domains, several applications suffer from a paucity of representative and diverse data. The …
SGX-LKL: Securing the host OS interface for trusted execution
Hardware support for trusted execution in modern CPUs enables tenants to shield their data
processing workloads in otherwise untrusted cloud environments. Runtime systems for the …
processing workloads in otherwise untrusted cloud environments. Runtime systems for the …
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
Intel SGX is a hardware-based trusted execution environment (TEE), which enables an
application to compute on confidential data in a secure enclave. SGX assumes a powerful …
application to compute on confidential data in a secure enclave. SGX assumes a powerful …
Crowdguard: Federated backdoor detection in federated learning
Federated Learning (FL) is a promising approach enabling multiple clients to train Deep
Neural Networks (DNNs) collaboratively without sharing their local training data. However …
Neural Networks (DNNs) collaboratively without sharing their local training data. However …
A {Log-Structured} Merge Tree-aware Message Authentication Scheme for Persistent {Key-Value} Stores
Persistent key-value stores (KVSs) are fundamental building blocks of modern software
products. A KVS stores persistent states for the products in the form of objects associated …
products. A KVS stores persistent states for the products in the form of objects associated …
[HTML][HTML] FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation
Self-driving vehicles have attracted significant attention in the automotive industry that is
heavily investing to reach the level of reliability needed from these safety critical systems …
heavily investing to reach the level of reliability needed from these safety critical systems …
[HTML][HTML] TFHE-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments
Abstract Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs)
are complementing approaches that can both secure computa-tions running remotely on a …
are complementing approaches that can both secure computa-tions running remotely on a …
TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack
ARM's TrustZone is a hardware-based trusted execution environment (TEE), prevalent in
mobile devices, IoT edge systems, and autonomous systems. Within TrustZone, security …
mobile devices, IoT edge systems, and autonomous systems. Within TrustZone, security …
[PDF][PDF] Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments
IS Singh - Master's thesis, UiT Norges arktiske universitet, 2020 - munin.uit.no
Increases in data production and growing demands for more computing power leads to the
current trend of outsourcing data and computation services to cloud providers. With data …
current trend of outsourcing data and computation services to cloud providers. With data …